Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Corelight Investigator introduces new Machine Learning Models

Corelight Investigator furthers its commitment to delivering next-level analytics through the expansion of its machine learning models. Security teams are now enabled with additional supervised and deep learning models, including: We continue to provide complete transparency behind our evidence -- showing the logic behind our machine learning models and detections, allowing analysts to quickly and easily validate the alerts.

Ultimate Guide to OWASP API Top 10

The OWASP API Top 10 is a list of common vulnerabilities found in APIs. OWASP created it as a resource for developers, testers, and security professionals to help them understand how to protect against API threats. Many people think that APIs are just another type of web application, but they're not; they have their own set of risks and challenges that need to be addressed. A simple API call can result in a data breach that could have lasting consequences for your business.

Introducing the LimaCharlie Query Language (LCSQL) BETA

This is an early introduction to the LimaCharlie Query Language (LCQL): a SQL-like language designed to allow users to quick and easily leverage historical telemetry and search across their entire fleet. It is an exciting new capability that enables a whole new class of use cases.

Stories from the SOC - RapperBot, Mirai Botnet - C2, CDIR Drop over SSH

Since mid-June 2022, AT&T Managed Extended Detection and Response (MXDR) Security Operations Center (SOC) observed an enormous number of attacks from Mirai botnet-C2 attempting to gain access to SSH servers instead of Telnet.Due to the various tactics, techniques, and procedures (TTP) observed, this attack has been associated with RapperBot botnet (Mirai variants.) RapperBot’s goal is still undefined.

The benefits of outsourced Data Protection Officer as a Service

As the world becomes increasingly digital and cloud based, the importance of data protection and privacy has become paramount for all organizations. One key aspect of ensuring compliance with data protection laws and regulations is the appointment of a Data Protection Officer (DPO). However, appointing a DPO internally can present several challenges, including conflicts of interest and a lack of specialized skills. That is where Data Protection Officer as a Service (DPOaaS) comes in.

AI Identity Verification: Top changes in Digital Verification & Onboarding

Identity verification is a critical aspect of many businesses and organizations, ensuring that the individuals accessing resources or services are who they claim to be. With the advent of Artificial Intelligence (AI), this process has become more efficient, secure, and cost-effective. In this blog, we will explore how AI is being used in identity verification and its potential benefits.

Automating SOC Operations: Tips for Embarking on an XDR Journey

Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of limited resources to protect the enterprise. However, when it comes to implementing automation with a target of achieving extended detection and response (XDR), it can be hard to know where to start and how to build a case for investment.